Malware And CampaignsCampaign

DPRK LNK malware using GitHub for command and control

April 2, 2026Threat Intelligence, Kimberly

Threat Intelligence and Fortinet-linked posts describe a DPRK-linked campaign using malicious LNK files and encoded PowerShell, with GitHub used as a command-and-control channel and scheduled tasks for persistence.

DPRK-linked campaign uses malicious LNK files, encoded PowerShell, and GitHub for C2.
Persistence via Scheduled Tasks and strong evasion tactics observed
Fortinet Threat Research Blog | DPRK-Related Campaigns with LNK and GitHub C2
Threat Intelligence
Kimberly
githubc2malwaregithubsocial engineering

See what experts are saying right now

This finding is one of many signals tracked across Cyber Security. The live feed updates every few hours with new expert voices, debates, and emerging ideas.

← Back to Cyber Security